• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 09:15
CET 15:15
KST 23:15
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
TL.net Map Contest #21: Winners11Intel X Team Liquid Seoul event: Showmatches and Meet the Pros10[ASL20] Finals Preview: Arrival13TL.net Map Contest #21: Voting12[ASL20] Ro4 Preview: Descent11
Community News
StarCraft, SC2, HotS, WC3, Returning to Blizzcon!45$5,000+ WardiTV 2025 Championship7[BSL21] RO32 Group Stage4Weekly Cups (Oct 26-Nov 2): Liquid, Clem, Solar win; LAN in Philly2Weekly Cups (Oct 20-26): MaxPax, Clem, Creator win10
StarCraft 2
General
Mech is the composition that needs teleportation t TL.net Map Contest #21: Winners StarCraft, SC2, HotS, WC3, Returning to Blizzcon! RotterdaM "Serral is the GOAT, and it's not close" Weekly Cups (Oct 20-26): MaxPax, Clem, Creator win
Tourneys
Constellation Cup - Main Event - Stellar Fest Sparkling Tuna Cup - Weekly Open Tournament $5,000+ WardiTV 2025 Championship Merivale 8 Open - LAN - Stellar Fest Sea Duckling Open (Global, Bronze-Diamond)
Strategy
Custom Maps
Map Editor closed ?
External Content
Mutation # 499 Chilling Adaptation Mutation # 498 Wheel of Misfortune|Cradle of Death Mutation # 497 Battle Haredened Mutation # 496 Endless Infection
Brood War
General
FlaSh on: Biggest Problem With SnOw's Playstyle BW General Discussion [ASL20] Ask the mapmakers — Drop your questions BGH Auto Balance -> http://bghmmr.eu/ Where's CardinalAllin/Jukado the mapmaker?
Tourneys
[Megathread] Daily Proleagues [ASL20] Grand Finals [BSL21] RO32 Group A - Saturday 21:00 CET [BSL21] RO32 Group B - Sunday 21:00 CET
Strategy
PvZ map balance Current Meta How to stay on top of macro? Soma's 9 hatch build from ASL Game 2
Other Games
General Games
Stormgate/Frost Giant Megathread Nintendo Switch Thread Path of Exile Should offensive tower rushing be viable in RTS games? Dawn of War IV
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread SPIRED by.ASL Mafia {211640}
Community
General
Russo-Ukrainian War Thread US Politics Mega-thread Things Aren’t Peaceful in Palestine The Games Industry And ATVI YouTube Thread
Fan Clubs
White-Ra Fan Club The herO Fan Club!
Media & Entertainment
[Manga] One Piece Anime Discussion Thread Movie Discussion! Korean Music Discussion Series you have seen recently...
Sports
2024 - 2026 Football Thread Formula 1 Discussion NBA General Discussion MLB/Baseball 2023 TeamLiquid Health and Fitness Initiative For 2023
World Cup 2022
Tech Support
SC2 Client Relocalization [Change SC2 Language] Linksys AE2500 USB WIFI keeps disconnecting Computer Build, Upgrade & Buying Resource Thread
TL Community
The Automated Ban List
Blogs
Learning my new SC2 hotkey…
Hildegard
Coffee x Performance in Espo…
TrAiDoS
Saturation point
Uldridge
DnB/metal remix FFO Mick Go…
ImbaTosS
Reality "theory" prov…
perfectspheres
Our Last Hope in th…
KrillinFromwales
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1612 users

I did some digging in the new anticheat - Page 3

Forum Index > Legacy of the Void
Post a Reply
Prev 1 2 3 4 Next All
brickrd
Profile Blog Joined March 2014
United States4894 Posts
July 29 2015 07:40 GMT
#41
On July 28 2015 23:42 RoomOfMush wrote:
Many hacks work by analysing the RAM and changing values (which you can do absolutely NOTHING against) but there is always security through obscurity. I could imagine automatic updates, perhaps once every week, that move all the variables around and thus make all hacks obsolete. So each time there is an update hackers would have to change their hacks and update as well. This might become tiring for some hackers and discourage them.

you realize that security through obscurity is a sarcastic term and its actually a bad thing, right?
TL+ Member
Big J
Profile Joined March 2011
Austria16289 Posts
July 29 2015 07:46 GMT
#42
On July 29 2015 16:19 weikor wrote:
Ok, on the other hand - lets assume blizzard CANT fix the hacks.
Does it really matter?

Unless hes disrupting my game - drophack etc, or hes gaining an economical advantage - more minerals - the game is still winnable. Maphack really only punishes hidden expansions or cheesy builds you dont want scouted. Maphack basically provides the advantage of 1 scan in his base, and an SCV searching for hidden expos.

Im not trying to defend it, but think of it this way - maphack boosts you up one league, but unless youre winning money it makes no difference .

Imagine, You are diamond, Tony is Silver, and Bob is also diamond.

The other 2 decide that hacking is the way to go.
So bob now advances to master league, but faces mechanically superior opponents - hits a wall and can barely improve - hes still a bad player.
Tony has special service on his hack, advances to diamond - but you still crush him because he makes 30% less SCVS and spends his time supply blocked while looking at the map.

In any way, these players are still "Bad", and for 99% theres no other reason to play sc2 than self improvement.


Sorry, but that's not how it works. Counterattacking, dropping and mutalisk-play all become unviable with this. I've once played a hacker who made it to mass ravens. Good luck trying to get a fungal off if he always knows where your infestors are, even if you burrow them (I didn't even get close to his ravens).
Techswitch based play - completely useless too.
ThunderBum
Profile Joined November 2010
Australia192 Posts
July 29 2015 07:52 GMT
#43
On July 29 2015 16:40 brickrd wrote:
Show nested quote +
On July 28 2015 23:42 RoomOfMush wrote:
Many hacks work by analysing the RAM and changing values (which you can do absolutely NOTHING against) but there is always security through obscurity. I could imagine automatic updates, perhaps once every week, that move all the variables around and thus make all hacks obsolete. So each time there is an update hackers would have to change their hacks and update as well. This might become tiring for some hackers and discourage them.

you realize that security through obscurity is a sarcastic term and its actually a bad thing, right?


Worked for Apple.
RoomOfMush
Profile Joined March 2015
1296 Posts
Last Edited: 2015-07-29 08:32:16
July 29 2015 08:31 GMT
#44
On July 29 2015 16:40 brickrd wrote:
Show nested quote +
On July 28 2015 23:42 RoomOfMush wrote:
Many hacks work by analysing the RAM and changing values (which you can do absolutely NOTHING against) but there is always security through obscurity. I could imagine automatic updates, perhaps once every week, that move all the variables around and thus make all hacks obsolete. So each time there is an update hackers would have to change their hacks and update as well. This might become tiring for some hackers and discourage them.

you realize that security through obscurity is a sarcastic term and its actually a bad thing, right?

It is not a "sarcastic term" it is a strategy. Some people believe it is a suboptimal strategy, but that really depends on the problem at hand.
You can not say one tool is just bad. Its a tool, its designed to do a certain purpose. There are no bad tools, there might only be too few applications for them.

People who say "Security through obscurity" is "bad" really mean that it is worse then a solid foundation that allows you to use more profound security measures. Unfortunately the foundation in our situation is flawed (from a security point of view) and unlikely to change so security through obscurity suddenly becomes a valid option.
Dismissing an option on the grounds of what others say is a very stupid move.



On July 29 2015 15:53 Archiatrus wrote:
I do not think the weekly update thing works. I have no idea how this really works but I assume, that you somehow can "break" into the executable and make specific function calls. So if for example if the mineral count is saved every week on another place you can just update the hack by running something like: drone.deliverMinerals() or similar. Then you just profile which memory accesses are made and you now know where the mineral count is stored. Or for the production tab you run something like openProductionTab(). It will check whether you are a spectator or not. Well, there is the position for the spectator rights Boolean in the memory. Obfuscation of the values would also not work. Just say you build a drone, your worker has minerals, your worker shall deliver them. The last two you repeat 10000 times. You do not have to let it play this for real. Just set the has Boolean that it has minerals true and then deliver. Your cpu should run through this in no time. That way you have all the values from 0-50000 minerals that end on 0 or 5. Then you make some extractor trick at the beginning and you get the values that end on 4 and 9 etc. Actually, imo this "obstacle" would make it more fun to write the hack.
To make it one level harder you could change the function names to random signs. The problem is that at some point the function has to be clear. If you press a hotkey the "hotkeyToFunction"-function needs to know what to do. You would not want your marines to manually detonate when you press stim;) So what you do is call the "hotkeyToFunction"-function with "[stim hotkey]" and monitor which function calls are made after this. Voila you know that 9q82(/&Hsjg& is in fact marine.stim(). So the plan is basically: poke it with a stick and see what exactly happens. Is this hard or tedious? Yes (depending on your hacking abilities). But after you have done it once you just write a script that replicates this very systematically poking and you just run it once per week.

Like I said, I have no idea whether the assumption that you can "break" into the executable, make and monitor function calls and memory accesses is too far fetched. And I am quite sure it is not as easy as described above, but I am also convinced there is no way to prevent or even make it too complicated to hack. The only way is to try to detect hacks somehow when they are used. But this is a lot harder on the blizzard side without violating your privacy. (And then I would be f*cked since I use the MMR Rating Tool;) )

That is not how it works. SC2 is not written in Java, it is a compiled program that you get in byte-code format. There are no functions, there are no methods, there are no classes and there are no structs.

All you can do is monitor the values in your RAM and change them and see what happens. There is no dynamic code analysis that you can perform. Detecting a "hack" is impossible when the hack simply reads and writes your RAM. The user is in full control of his/her computer and blizzard can do jack shit about that. If they want to read their own memory they can do so and you can not detect it or do anything about it.
aka_star
Profile Blog Joined July 2007
United Kingdom1546 Posts
July 29 2015 08:45 GMT
#45
I'm not sure you quite understand Blizzards anti cheat methodology. This is proven from the past. Warden is there to execute a payload of arbitrary code at any time. Blizzard just looks at the popular cheats programs out there, they write a detection routine and one day turn it on. Then they ban all the sheeple that were using it over a weekend in a big wave and make a story about it to scare others from trying it until next year. It's their cost efficient approach of taking out the trash once a year rather than cleaning up every day.
FlashDave.999 aka Star
RoomOfMush
Profile Joined March 2015
1296 Posts
July 29 2015 09:07 GMT
#46
On July 29 2015 17:45 aka_star wrote:
I'm not sure you quite understand Blizzards anti cheat methodology. This is proven from the past. Warden is there to execute a payload of arbitrary code at any time. Blizzard just looks at the popular cheats programs out there, they write a detection routine and one day turn it on. Then they ban all the sheeple that were using it over a weekend in a big wave and make a story about it to scare others from trying it until next year. It's their cost efficient approach of taking out the trash once a year rather than cleaning up every day.

They can still do that. The method I proposed can be applied on top of that to make hacking more annoying for the casual hackers. Its a completely automated process that doesnt cost blizzard a penny except for the initial employment.
Archiatrus
Profile Joined June 2014
Germany64 Posts
July 29 2015 09:24 GMT
#47
On July 29 2015 17:31 RoomOfMush wrote:

Show nested quote +
On July 29 2015 15:53 Archiatrus wrote:
I do not think the weekly update thing works. I have no idea how this really works but I assume, that you somehow can "break" into the executable and make specific function calls. So if for example if the mineral count is saved every week on another place you can just update the hack by running something like: drone.deliverMinerals() or similar. Then you just profile which memory accesses are made and you now know where the mineral count is stored. Or for the production tab you run something like openProductionTab(). It will check whether you are a spectator or not. Well, there is the position for the spectator rights Boolean in the memory. Obfuscation of the values would also not work. Just say you build a drone, your worker has minerals, your worker shall deliver them. The last two you repeat 10000 times. You do not have to let it play this for real. Just set the has Boolean that it has minerals true and then deliver. Your cpu should run through this in no time. That way you have all the values from 0-50000 minerals that end on 0 or 5. Then you make some extractor trick at the beginning and you get the values that end on 4 and 9 etc. Actually, imo this "obstacle" would make it more fun to write the hack.
To make it one level harder you could change the function names to random signs. The problem is that at some point the function has to be clear. If you press a hotkey the "hotkeyToFunction"-function needs to know what to do. You would not want your marines to manually detonate when you press stim;) So what you do is call the "hotkeyToFunction"-function with "[stim hotkey]" and monitor which function calls are made after this. Voila you know that 9q82(/&Hsjg& is in fact marine.stim(). So the plan is basically: poke it with a stick and see what exactly happens. Is this hard or tedious? Yes (depending on your hacking abilities). But after you have done it once you just write a script that replicates this very systematically poking and you just run it once per week.

Like I said, I have no idea whether the assumption that you can "break" into the executable, make and monitor function calls and memory accesses is too far fetched. And I am quite sure it is not as easy as described above, but I am also convinced there is no way to prevent or even make it too complicated to hack. The only way is to try to detect hacks somehow when they are used. But this is a lot harder on the blizzard side without violating your privacy. (And then I would be f*cked since I use the MMR Rating Tool;) )

That is not how it works. SC2 is not written in Java, it is a compiled program that you get in byte-code format. There are no functions, there are no methods, there are no classes and there are no structs.

All you can do is monitor the values in your RAM and change them and see what happens. There is no dynamic code analysis that you can perform. Detecting a "hack" is impossible when the hack simply reads and writes your RAM. The user is in full control of his/her computer and blizzard can do jack shit about that. If they want to read their own memory they can do so and you can not detect it or do anything about it.


Hm I always thought you could find even after compilation the functions (or specific instruction patterns or.. sry I do not know how to call those). But how did the OP then find the anti-cheat code?
So I can not run those "functions" from the outside on purpose. But what about the editor? You make a special map where the units make a certain set of instructions and you make snapshots of the RAM. See what changed after each instruction and then automatically deduce where what is stored? For example you walk over a mineral globe, get 100 mins, build spine crawler. So some value got up and than down to its original value. Then you run those map after each weekly update.
RoomOfMush
Profile Joined March 2015
1296 Posts
Last Edited: 2015-07-29 09:39:04
July 29 2015 09:36 GMT
#48
There are literally millions of values that change every few nanoseconds. Just watching for any change and trying to deduce which adress is the right one is a very suboptimal solution, especially if the original value might be obscured (through one of the means I originally described). It would be like picking the right grain of sand on the beach.

If you are interested in the detailed mechanics of reverse engineering I would suggest watching a video on this or reading a tutorial. There are actually videos where people show you how to write a hack for SC2 yourself. Alternatively do an internet search for "reverse engineering C++".
Dickbutt
Profile Joined May 2015
Korea (North)129 Posts
July 29 2015 12:02 GMT
#49
On July 29 2015 18:36 RoomOfMush wrote:
There are literally millions of values that change every few nanoseconds. Just watching for any change and trying to deduce which adress is the right one is a very suboptimal solution, especially if the original value might be obscured (through one of the means I originally described). It would be like picking the right grain of sand on the beach.

If you are interested in the detailed mechanics of reverse engineering I would suggest watching a video on this or reading a tutorial. There are actually videos where people show you how to write a hack for SC2 yourself. Alternatively do an internet search for "reverse engineering C++".

I think this is the best summary for why the weekly update idea is not a good one.
스타일, 스타트, 스베누!
Dingodile
Profile Joined December 2011
4137 Posts
July 29 2015 12:21 GMT
#50
be aware using this. ReminD (wc3 pro player) got banned from Blizzard by using anticheat (in wc3 days).
Grubby | ToD | Moon | Lyn | Sky
JimmyJRaynor
Profile Blog Joined April 2010
Canada16969 Posts
July 29 2015 13:09 GMT
#51
making hacking very difficult or impossible can't be done. its been a problem for 20 years and lots of big companies have taken a shot at this issue and have failed.

many aspects of the online experience have been improved since 1995 by several studios. however, players using hacks continues to this day.
Ray Kassar To David Crane : "you're no more important to Atari than the factory workers assembling the cartridges"
RoomOfMush
Profile Joined March 2015
1296 Posts
July 29 2015 13:19 GMT
#52
On July 29 2015 21:02 Dickbutt wrote:
Show nested quote +
On July 29 2015 18:36 RoomOfMush wrote:
There are literally millions of values that change every few nanoseconds. Just watching for any change and trying to deduce which adress is the right one is a very suboptimal solution, especially if the original value might be obscured (through one of the means I originally described). It would be like picking the right grain of sand on the beach.

If you are interested in the detailed mechanics of reverse engineering I would suggest watching a video on this or reading a tutorial. There are actually videos where people show you how to write a hack for SC2 yourself. Alternatively do an internet search for "reverse engineering C++".

I think this is the best summary for why the weekly update idea is not a good one.

What? How? Nothing I said in that quoted post has anything to do with weekly updates.
JacobShock
Profile Blog Joined April 2012
Denmark2485 Posts
July 29 2015 13:20 GMT
#53
I understand nothing about programming but it saddens me to hear this, but from reading your post it seems like you have no clue either about what to do about it? It sucks, but I guess hacking is something we are going to have to deal with. If Blizzard was just more proactive about catching players and looking at reports, that would at least be something.
"Right on" - Morrow
HornyHerring
Profile Joined March 2011
Papua New Guinea1059 Posts
July 29 2015 14:06 GMT
#54
Blizzard is suing hack devs, just the big ones, and have been since the early days of WoW. And trust me, it's not a solution.
oh, hai
JCoto
Profile Joined October 2014
Spain574 Posts
Last Edited: 2015-07-29 16:16:07
July 29 2015 14:26 GMT
#55
There is no new anticheat.

It's just the old one from HotS, applied onto LotV. So the cheat works the same by possibly changing 4-10 lines of code?

Blizz is lazy. But they have to find an anticheat, because Heroes of the Storm shares the same engine and the SC2 hack also serves to give vision, and I bet they have to do something about it.

It's 1 problem (engine-based) for 2 games, so they have to fix it some day, for sure.
rockslave
Profile Blog Joined January 2008
Brazil318 Posts
July 29 2015 14:34 GMT
#56
On July 29 2015 17:31 RoomOfMush wrote:
Show nested quote +
On July 29 2015 16:40 brickrd wrote:
On July 28 2015 23:42 RoomOfMush wrote:
Many hacks work by analysing the RAM and changing values (which you can do absolutely NOTHING against) but there is always security through obscurity. I could imagine automatic updates, perhaps once every week, that move all the variables around and thus make all hacks obsolete. So each time there is an update hackers would have to change their hacks and update as well. This might become tiring for some hackers and discourage them.

you realize that security through obscurity is a sarcastic term and its actually a bad thing, right?

It is not a "sarcastic term" it is a strategy. Some people believe it is a suboptimal strategy, but that really depends on the problem at hand.
You can not say one tool is just bad. Its a tool, its designed to do a certain purpose. There are no bad tools, there might only be too few applications for them.

People who say "Security through obscurity" is "bad" really mean that it is worse then a solid foundation that allows you to use more profound security measures. Unfortunately the foundation in our situation is flawed (from a security point of view) and unlikely to change so security through obscurity suddenly becomes a valid option.
Dismissing an option on the grounds of what others say is a very stupid move.



One good example: even if you have a very good password in a server, there's no good reason not to change the SSH port. You gain nothing against the serious offender, but the random chinese brute force bots won't bother you.
What qxc said.
bucckevin
Profile Joined April 2011
858 Posts
July 29 2015 14:54 GMT
#57
I used to laugh at Avilo for constantly accusing his opponents of cheating until I played against a very blatant hacker in a game. I mean I hear about hacks here and there but never experienced very blatant hacking and after that experience, I pretty much lost interest in the game. Coming here and seeing how prevalent it is, I'm glad I stopped playing. It's just not fun playing a game with the goal of getting better and getting higher ranking when in the back of your mind, your opponents could be cheating.
RaiZ
Profile Blog Joined April 2003
2813 Posts
July 29 2015 15:07 GMT
#58
On July 29 2015 23:54 bucckevin wrote:
I used to laugh at Avilo for constantly accusing his opponents of cheating until I played against a very blatant hacker in a game. I mean I hear about hacks here and there but never experienced very blatant hacking and after that experience, I pretty much lost interest in the game. Coming here and seeing how prevalent it is, I'm glad I stopped playing. It's just not fun playing a game with the goal of getting better and getting higher ranking when in the back of your mind, your opponents could be cheating.

How old are you ? Welcome to the real world. I can guarantee you that you'll see it everywhere, be it sport, politics, or anything. But hey, it's better to think that the world is fair and peaceful right ?
Man is least himself when he talks in his own person. Give him a mask, and he will tell you the truth. Oscar Wilde
RoomOfMush
Profile Joined March 2015
1296 Posts
July 29 2015 15:40 GMT
#59
On July 29 2015 23:34 rockslave wrote:
Show nested quote +
On July 29 2015 17:31 RoomOfMush wrote:
On July 29 2015 16:40 brickrd wrote:
On July 28 2015 23:42 RoomOfMush wrote:
Many hacks work by analysing the RAM and changing values (which you can do absolutely NOTHING against) but there is always security through obscurity. I could imagine automatic updates, perhaps once every week, that move all the variables around and thus make all hacks obsolete. So each time there is an update hackers would have to change their hacks and update as well. This might become tiring for some hackers and discourage them.

you realize that security through obscurity is a sarcastic term and its actually a bad thing, right?

It is not a "sarcastic term" it is a strategy. Some people believe it is a suboptimal strategy, but that really depends on the problem at hand.
You can not say one tool is just bad. Its a tool, its designed to do a certain purpose. There are no bad tools, there might only be too few applications for them.

People who say "Security through obscurity" is "bad" really mean that it is worse then a solid foundation that allows you to use more profound security measures. Unfortunately the foundation in our situation is flawed (from a security point of view) and unlikely to change so security through obscurity suddenly becomes a valid option.
Dismissing an option on the grounds of what others say is a very stupid move.



One good example: even if you have a very good password in a server, there's no good reason not to change the SSH port. You gain nothing against the serious offender, but the random chinese brute force bots won't bother you.

Thats not a counter-argument. As I said, whether a strategy is "good" or "bad" depends on the situation. A server password is a different situation then a massively multiplayer online game like starcraft.
JimmyJRaynor
Profile Blog Joined April 2010
Canada16969 Posts
Last Edited: 2015-07-29 16:15:10
July 29 2015 15:58 GMT
#60
On July 29 2015 17:31 RoomOfMush wrote:
Show nested quote +
On July 29 2015 16:40 brickrd wrote:
On July 28 2015 23:42 RoomOfMush wrote:
Many hacks work by analysing the RAM and changing values (which you can do absolutely NOTHING against) but there is always security through obscurity. I could imagine automatic updates, perhaps once every week, that move all the variables around and thus make all hacks obsolete. So each time there is an update hackers would have to change their hacks and update as well. This might become tiring for some hackers and discourage them.

you realize that security through obscurity is a sarcastic term and its actually a bad thing, right?

It is not a "sarcastic term" it is a strategy. Some people believe it is a suboptimal strategy, but that really depends on the problem at hand.
You can not say one tool is just bad. Its a tool, its designed to do a certain purpose. There are no bad tools, there might only be too few applications for them.

People who say "Security through obscurity" is "bad" really mean that it is worse then a solid foundation that allows you to use more profound security measures. Unfortunately the foundation in our situation is flawed (from a security point of view) and unlikely to change so security through obscurity suddenly becomes a valid option.
Dismissing an option on the grounds of what others say is a very stupid move.

+1 obfuscation is an option and can work well in the hands of a skilled software developer for certain problems.
obfuscation has been used for many years.

didn't the first few versions of MS Visual Studio come with an obfuscator ?
i'm almost positive MS VS 2005 had one.

Many encryption methodologies include an element of obfuscation.

Ray Kassar To David Crane : "you're no more important to Atari than the factory workers assembling the cartridges"
Prev 1 2 3 4 Next All
Please log in or register to reply.
Live Events Refresh
Wardi Open
12:00
#59
WardiTV1680
OGKoka 344
Rex111
IntoTheiNu 46
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
OGKoka 344
Hui .270
Rex 111
Vindicta 20
StarCraft: Brood War
Rain 8953
Jaedong 4649
GuemChi 2249
Horang2 1892
Sea 1800
Pusan 538
Larva 351
Stork 348
Mini 340
firebathero 329
[ Show more ]
Hyun 222
PianO 85
Backho 76
Killer 74
ggaemo 73
Barracks 63
ToSsGirL 58
sSak 55
Aegong 53
Sea.KH 53
JYJ47
JulyZerg 44
Mong 35
Sharp 32
soO 25
sas.Sziky 23
zelot 16
scan(afreeca) 14
Noble 9
Terrorterran 8
ajuk12(nOOB) 8
Sacsri 8
SilentControl 6
Rock 5
Dota 2
Gorgc4112
qojqva2569
Dendi967
XcaliburYe233
420jenkins151
Counter-Strike
olofmeister1720
zeus714
allub315
oskar107
Super Smash Bros
amsayoshi72
Other Games
B2W.Neo965
Pyrionflax476
hiko414
crisheroes323
Lowko264
Fuzer 228
Sick211
Liquid`LucifroN136
Mew2King99
QueenE55
Organizations
StarCraft: Brood War
lovetv 10
Kim Chul Min (afreeca) 3
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 14 non-featured ]
StarCraft 2
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• Michael_bg 3
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
Dota 2
• WagamamaTV290
League of Legends
• Nemesis1716
• TFBlade413
Upcoming Events
Wardi Open
1h 45m
Replay Cast
8h 45m
WardiTV Korean Royale
21h 45m
Replay Cast
1d 8h
Replay Cast
1d 18h
Kung Fu Cup
1d 21h
Classic vs Solar
herO vs Cure
Reynor vs GuMiho
ByuN vs ShoWTimE
Tenacious Turtle Tussle
2 days
The PondCast
2 days
RSL Revival
2 days
Solar vs Zoun
MaxPax vs Bunny
Kung Fu Cup
2 days
[ Show More ]
WardiTV Korean Royale
2 days
PiGosaur Monday
3 days
RSL Revival
3 days
Classic vs Creator
Cure vs TriGGeR
Kung Fu Cup
3 days
CranKy Ducklings
4 days
RSL Revival
4 days
herO vs Gerald
ByuN vs SHIN
Kung Fu Cup
4 days
BSL 21
5 days
Tarson vs Julia
Doodle vs OldBoy
eOnzErG vs WolFix
StRyKeR vs Aeternum
Sparkling Tuna Cup
5 days
RSL Revival
5 days
Reynor vs sOs
Maru vs Ryung
Kung Fu Cup
5 days
WardiTV Korean Royale
5 days
BSL 21
6 days
JDConan vs Semih
Dragon vs Dienmax
Tech vs NewOcean
TerrOr vs Artosis
Wardi Open
6 days
Liquipedia Results

Completed

Proleague 2025-11-07
Stellar Fest: Constellation Cup
Eternal Conflict S1

Ongoing

C-Race Season 1
IPSL Winter 2025-26
KCM Race Survival 2025 Season 4
SOOP Univ League 2025
YSL S2
BSL Season 21
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual

Upcoming

SLON Tour Season 2
BSL 21 Non-Korean Championship
Acropolis #4
IPSL Spring 2026
HSC XXVIII
RSL Offline Finals
WardiTV 2025
RSL Revival: Season 3
META Madness #9
BLAST Bounty Winter 2026
BLAST Bounty Winter 2026: Closed Qualifier
eXTREMESLAND 2025
ESL Impact League Season 8
SL Budapest Major 2025
BLAST Rivals Fall 2025
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.